Hi Everybody

I think you all have missed the essential point here - the idea is not to circumvent the restrictions imposed. This restriction is generally and globally imposed on one and all. However exceptions are made on an individual basis to this policy given ones circumstances. I have already applied for my case to be considered as an exception. It just takes a while for things to get implemented in a large organisation such as ours. And further, this is not going to wreck havoc as no attempt is made to access the inaccessible part of the network by doing what I am looking at doing. I am not trying to access some part of the network that I already do not have access to.

and apparently there can be no exceptions to this company policy with reference to the Network Security
What I meant by the statement in my original post was that without rhyme or reason, there can be no exception just because someone does not like it. However, given proper justification, it can be looked into and exception granted if found acceptable to the Network Security authorities.

It is a trifle discomforting to see people carrying this kind of preconceived notions - but I can relate to that given that we hear all kinds of bad activities that people indulge in all the time. However, please be assured I have no such sinister intents.

Given the above explanation, I am sure some of you will appreciate the genuineness of the request. Notwithstanding the above, should any or all of you still feel that you cannot offer any assistance, then of course you are more than welcome. I can understand your stand - whether or not I agree with your position is another matter.

The idea is to be able to get back to the application without having to interrupt the code.

In anticipation

Best regards


Deepak